Search

Your search keyword '"Neng Gao"' showing total 57 results

Search Constraints

Start Over You searched for: Author "Neng Gao" Remove constraint Author: "Neng Gao" Topic business Remove constraint Topic: business
57 results on '"Neng Gao"'

Search Results

1. Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation

2. Experimental Investigation of the Ejector Refrigeration Cycle for Cascade System Application

3. MCCR: Learning Multi-order Convolutional Correlations for Recommendation

4. MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks

6. Experimental investigation on a novel triple heat sources-driven absorption heat pump system

7. TransGate: Knowledge Graph Embedding with Shared Gate Structure

8. CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model

9. TEA-RNN: Topic-Enhanced Attentive RNN for Attribute Inference Attacks via User Behaviors

10. Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System

11. Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption

12. Incorporating Common Knowledge and Specific Entity Linking Knowledge for Machine Reading Comprehension

13. User Preference Excitation Network for Sequential Recommendation

14. Binarized Attributed Network Embedding via Neural Networks

15. User Alignment with Jumping Seed Alignment Information Propagation

16. FGCRec: Fine-Grained Geographical Characteristics Modeling for Point-of-Interest Recommendation

17. Multiple Demographic Attributes Prediction in Mobile and Sensor Devices

18. TransBidiFilter: Knowledge Embedding Based on a Bidirectional Filter

19. Reducing Style Overfitting for Character Recognition via Parallel Neural Networks with Style to Content Connection

20. More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A

21. AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC

22. Differential Attribute Desensitization System for Personal Information Protection

23. Your Pedometer Tells You: Attribute Inference via Daily Walking Step Count

24. Attributed Network Embedding via a Siamese Neural Network

25. Node-Edge Bilateral Attributed Network Embedding

26. Anchor User Oriented Accordant Embedding for User Identity Linkage

27. SCS: Style and Content Supervision Network for Character Recognition with Unseen Font Style

28. TransI: Translating Infinite Dimensional Embeddings Based on Trend Smooth Distance

29. STNet: A Style Transformation Network for Deep Image Steganography

30. DCAR: Deep Collaborative Autoencoder for Recommendation with Implicit Feedback

31. Aligning Users Across Social Networks by Joint User and Label Consistence Representation

32. Translation-Based Attributed Network Embedding

33. RIKE+: using revocable identities to support key escrow in public key infrastructures with flexibility

34. MultNet: An Efficient Network Representation Learning for Large-Scale Social Relation Extraction

35. A MIML-LSTM neural network for integrated fine-grained event forecasting

36. SSteGAN: Self-learning Steganography Based on Generative Adversarial Networks

37. CNN-Based Chinese Character Recognition with Skeleton Feature

38. NANE: Attributed Network Embedding with Local and Global Information

39. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices

40. Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC

41. Skin tissue engineering using 3D bioprinting: An evolving research field

42. Measurements of the isobaric heat capacity of R1234yf in liquid phase at temperatures from 305K to 355K and pressures up to 5MPa

44. A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers

46. Evaluation of Investment Risk in International Engineering Project Based on Improved Risk Matrix Method

47. QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations

48. Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services

49. Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage

50. Remotely wiping sensitive data on stolen smartphones

Catalog

Books, media, physical & digital resources